EP4156634A1 - Method of capturing packets from applications hosted containers - Google Patents

Method of capturing packets from applications hosted containers Download PDF

Info

Publication number
EP4156634A1
EP4156634A1 EP21199113.8A EP21199113A EP4156634A1 EP 4156634 A1 EP4156634 A1 EP 4156634A1 EP 21199113 A EP21199113 A EP 21199113A EP 4156634 A1 EP4156634 A1 EP 4156634A1
Authority
EP
European Patent Office
Prior art keywords
capture
network
packet capture
connection
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP21199113.8A
Other languages
German (de)
French (fr)
Inventor
Harald Albrecht
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Priority to EP21199113.8A priority Critical patent/EP4156634A1/en
Priority to PCT/EP2022/071313 priority patent/WO2023046340A1/en
Publication of EP4156634A1 publication Critical patent/EP4156634A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV

Definitions

  • the current disclosure relates to containers in industrial automation. More particularly, the current disclosure relates to packet capture and analysis of network traffic in relation to containers.
  • a packet capture tool also known as a packet sniffer or packet analyzer
  • a packet capture tool is a program or special hardware that is capable of intercepting and logging packets that transmitted in a network. These packets are then used to analyze network behavior to improve network performance.
  • the current disclosure relates to packet capture and analysis in industrial networks.
  • containers have been deployed in a plurality of scenarios including industrial automation.
  • multitube of physical assets there are a huge number of virtual assets in automation networks.
  • These virtual assets or industrial applications are deployed and executed in huge numbers, since they are container based and are rather small and nimble.
  • These industrial applications may run in the plant on Industrial Edges or may be executed on industrial OT clusters, where they still have direct network access to the production network. Accordingly, given the huge number of assets (both physical and virtual) in the automation network, it becomes necessary to perform network analysis to ensure network utilization is optimal.
  • packets in the network are recorded for analysis.
  • packet capture tools This is done by packet capture tools.
  • network traffic can be recorded inside and to/from an Industrial Edge device from a remote computer (also referred to as capture client), observe them live and evaluate them without delay during recording.
  • the packets are recorded in the industrial device, but not stored there, but instead immediately transferred via a so-called web socket connection to the capture client for recording and evaluation.
  • the communication between an application on the industrial device and the automation devices outside the industrial device must be recorded in particular at the physical interfaces of the industrial device in contrast to a recording purely at the virtual network interface of a container associated with the application.
  • feedback may arise in the recording or transmission of the recorded packets: since the packets are recorded at a point in the network of the industrial device, over which these packets are subsequently transmitted as a recording stream, feedback occurs.
  • the recording is massively inflated and not significantly reliable. Accordingly, there is a need for a capture service capable of automatically prevent self-recording.
  • the current disclosure describes a method according to claim 1 and a device according to claim 11 which address the issues mentioned above.
  • the current disclosure describes a method of capturing packets from one or more applications hosted on one or more containers connected to one or more network interfaces in a section of the industrial network by a packet capture service.
  • the packet capture service is connected to a packet capture client for transmitting the captured packets to the packet capture client and includes a first capture session capturing packets associated with a first container.
  • the method comprises receiving a capture request for capturing packets associated with a connection of a second container from the one or more containers, wherein the connection is between the second container and a network destination for transmitting one or more packets; determining a network path associated with the connection of the second container, wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination; determining the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approving the capture request based on the between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container.
  • the current disclosure describes a method for packet capture where incoming capture requests are checked for potential overlaps in relation to network interfaces with existing capture sessions and the connection between the packet capture service and the packet capture client (s). Accordingly, the current method ensures that the risk of self-recording is eliminated.
  • the capture request is approved when the one or more network interfaces are not present in the first capture session and the connection between the packet capture service and the packet capture client. Accordingly, the capture requests when there is a possibility of self-recording is determined based on the network interfaces and are not processed further.
  • the method further comprises generating a filter related to the capture request for capturing packets associated with the connection of the second container, when at least one network interface from the one or more network interfaces is present in the first capture session and the connection between the packet capture service and the packet capture client and wherein the filter comprises one or more filter expressions for filtering one or more of packets associated with the first capture session and packets originating from the packet capture service.
  • approving the capture request comprises detecting a presence of a filter in relation to the one or more network interfaces, wherein the capture request is not approved when the filter is detected. Accordingly, the method allows for determining if there is a filter already associated with the network interfaces and in case such a filter is already present, a new filter may not be compatible.
  • the capture request is transmitted by the packet capture client and the capture request comprises network information associated with the packet capture client. Accordingly, the determination of the network interfaces associated with the connection between the packet capture client and the packet capture service is determined based on the network information associated with the packet capture client. In an example, the capture request comprises network information associated with the second container. Accordingly, determination of the network path comprising determining one or more intermediate network interfaces based on the network information associated with the second container and a network topology associated the section of industrial network.
  • the method further determining a first set of network interfaces used in the connection between the packet capture service and the packet capture client based on the network information of the packet capture client and a network topology associated with the section of the industrial network.
  • the one or more intermediate network interfaces belong to at least one reverse proxy device.
  • the network topology includes IP/TCP address configuration and IP route information of the one or more containers and the one or more network interfaces.
  • the current disclosure describes a packet capture device for of capturing packets from one or more containers connected to one or more network interfaces in a section of the industrial network.
  • the packet capture device is connected to a packet capture client for transmitting the captured packets to the packet capture client and includes a first capture session capturing packets associated with a first container.
  • the packet capture device comprises one or more processors configured to receive a capture request for capturing packets associated with a connection of a second container from the one or more containers, wherein the connection is between the second container and a network destination for transmitting one or more packets; determine a network path associated with the connection of the second container, wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination; determine the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approve the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container.
  • the advantages of the method are applicable to the device as well. These aspects are further explained in relation to figures 1-3 .
  • Figure 1 illustrates a section of an industrial facility 100 comprising a plurality of applications (120, 130 and 140).
  • Industrial facility herein refers to any environment where one or more industrial processes such as manufacturing, refining, smelting, or assembly of equipment, generation, transmission or distribution of electricity, transportation, may take place. This includes process plants, oil refineries, automobile factories, power plants, smart grids, electrical substations, storehouses, etc.
  • the plurality of industrial process and operations may be carried out in production cells using a plurality of devices such as control devices, field devices, mobile devices, etc., present with the corresponding production cell.
  • the control devices include process controllers, programmable logic controllers, supervisory controllers, automated guided vehicles, robots, operator devices, etc.
  • One or more control devices are connected to a plurality of field devices (not shown in figure) such as actuators and sensor devices for monitoring and controlling various industrial processes in the industrial facility.
  • field devices can include flowmeters, value actuators, temperature sensors, pressure sensors, etc.
  • the industrial facility includes a plurality of mobile devices (also referred to as mobile network devices) including one or more robots for performing a plurality of operations such as welding, assembly of parts; one or more autonomous guided vehicles for transportation and handling of material; one or more assets with RFID tags on conveyor belts, etc. in the industrial facility.
  • the industrial facility may include an operator station for displaying the status of the industrial facility to an operator and for allowing the operator to define KPIs for the control of the industrial processes in the facility. All the industrial devices may be connected to each other via a plant network (realized via wired and wireless technologies).
  • the industrial facility utilizes the wireless communication network for enabling communication amongst the various devices of the industrial facility.
  • the wireless network is based on cellular technology and comprises a plurality of gateway devices or network devices.
  • Gateway devices herein refers to one or more devices capable of connecting the user devices to the wireless network. Examples of gateway devices include base stations, routers, switches, relays, access points, etc.
  • the plurality of gateway devices may include stationary gateway devices which may be affixed to a plurality of locations in the industrial facility.
  • a plurality of the industrial devices in the facility are connected to one or more gateway devices to connect to the wireless network and for communicating information with the other devices and systems in the industrial facility.
  • the industrial devices include the industrial applications which are capable of processing data from other industrial devices.
  • the applications (120, 130 and 140) are hosted on one or more containers (not shown in the figure) and accordingly may be hosted in a container cluster.
  • the applications may communicate with each other via one or more network / gateway devices present in the section 100.
  • application 120 is connected to the application 130 via the reverse proxy device 150.
  • application 130 is connected to the application 140 via the reverse proxy device 160.
  • the section 100 includes a packet capture service 110 for capturing packets associated with the applications (120, 130 and 140).
  • the packet capture service is configured to listen and capture packets at the external network interfaces associated with the reverse proxy devices. As mentioned previously, this is done since certain communications between an application an industrial device and the automation devices outside the industrial device must be recorded in particular at the physical interfaces instead of the virtual network interface of the container associated with the application. Such recordings at the external or physical interfaces are always necessary in order to detect or exclude disturbances in the communication components responsible in an industrial edge.
  • some applications must be connected directly at the level of the data link layer to plant networks - and thus to the external interfaces - because they have to speak non-IP-based automation protocols when communicating with automation devices.
  • the packet capture service 110 is connected to one or more packet capture clients (shown in the figure as packet capture client 180).
  • the packet capture service 110 is configured to receive capture request from a packet capture client, process the capture request, start a capture session in response to the capture request and transmit the captured packets to the packet capture client.
  • the packet capture service 110 is configured to process the capture request. Based on the processing, the packet capture service 110 determines if the capture session is to be created or not and if a filter is required in order to filter out certain packets from being captured. This is further explained in relation to figure 2 .
  • Figure 2 illustrates a method 200 of capturing packets from one or more applications hosted on one or more containers connected to one or more network interfaces in the section of the industrial network 100.
  • the method 200 is implemented by the packet capture service 110.
  • the packet capture service 110 is capturing packets associated with a communication between application 130 and application 140 at a first network interface of the reverse proxy device 160.
  • the packet capture service receives a capture request for capturing packets associated with a connection of a second container from the one or more containers.
  • the connection is between the second container and a network destination for transmitting one or more packets.
  • the second container is associated with the application 120 and the network destination is the container associated with the application 130.
  • the capture request is transmitted by the packet capture client 180.
  • the packet capture service determines a network path associated with the connection of the second container.
  • the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination.
  • the network path associated with the connection of the second container is determined based on network information associated with the second container.
  • the network information associated with the second container is determined by the packet capture service 110 using a network discovery and management service.
  • the network information of the second container is included in the capture request from the packet capture client.
  • the packet capture service is configured to determine the network path using a network topology associated with the section of the industrial facility 100.
  • Network topology herein refers to topological information of the network devices indicating the corresponding connections amongst the network devices.
  • the network topology indicates the physical and virtual connections between devices along with the data flows possible between the devices. For example, for linux devices, this include VETH network interface connection pair information. Accordingly, the network topology includes routing information, TCP/IP address configuration, and link layer information associated with the device in the network. Network topology additionally includes information on the network interfaces and their assignment to (virtual) IP stacks, assignment of the network interfaces to containers and their services, in particular the proxies and the capture service, the direct data link layer connections between network interfaces (in particular of type VETH and MACVLAN), the IP addresses assigned to the network interfaces, and the route information of the (virtual) IP stacks.
  • Network path herein refers to the various network interfaces and network devices over which the connection between the second container and the network destination is established.
  • Network interfaces includes both virtual and physical interfaces.
  • the network path between the second application associated with the application 120 and the network destination i.e. the container associated with the application 130 includes the network interfaces (virtual and real) of the second container on which the packets associated with the application 120 are transmitted/received, the network interfaces of the reverse proxy device 150 (which acts as an intermediate network device between the second container and the network destination), and the network interfaces (virtual and real) of the network destination on which the packets associated with the application 120 are transmitted/received.
  • the packet capture service determines the starting point of the path (212), that is: the (external) network interface, using the packet capture client's IP address and IP route tables to determine the incoming external network interface. Then, the packet capture service determines the end of the first path segment at the reverse proxy device RPR using the route table and IP addresses of the reverse proxy device. In additional reverse proxy devices are used, the packet capture service iteratively performs the above step to determine the network interfaces till the path terminates at the packet capture service. Accordingly, the packet capture service determines path segments based on the IP addresses recorded in web socket/HTTP headers mentioned in the capture request. Additionally, the packet capture service also records the TCP ports used along the path, as the individual segments are determined.
  • segment #1 from external ETH “ens33” with IP: port 1.2.3.4:443 to RPR's ETH “eth0” with 172.17.1.1:443, includes layer 2 interfaces “ens33", “docker0”, “veth1234", “ethO”; and segment #2: from RPR's "eth1” with 172.17.6.66:12345 to CS' "eth0” with 172.17.6.99:5001, includes layer 2 interfaces "eth1", “vethabcd”, “br-6667”, “vethxyzz", "eth0".
  • the packet capture service determines the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client. Based on the network path associated with the second container, the packet capture service determines if there is any overlap in the determined network path and the first capture session or the connection with the packet capture client.
  • the packet capture service is configured to determine the network interfaces associated with the packet capture client and the packet capture service. Similar to determination of the network path mentioned above, the packet capture service is configured to obtain network information associated with the packet capture client (from either a network discovery service or from the packet capture client itself) and based on the network information and the network topology, the packet capture service determines the network interfaces used in the connection between the packet capture client and the packet capture service.
  • the packet capture service determines if there is one or more network interfaces which is present in both the network path between the second container and the network destination, and the connection between the packet capture client and the packet capture service.
  • the packet capture service includes a network path for the first capture session which includes the network interfaces associated with the communication between application 130 and application 140, i.e., the network interfaces of the containers of the application 130 and 140, and the first network interface of the reverse proxy device 160.
  • the packet capture service determines if there is one or more network interfaces which is present in both the network path between the second container and the network destination, and the network path of the first capture session.
  • the packet capture service approves the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container.
  • the capture request is approved when the one or more network interfaces in the network path of the second connection are not present in the first capture session and the connection between the packet capture service and the packet capture client. Accordingly, when there is not overlap of network interfaces, the packet capture service determines that there is no likelihood of self-recording and accordingly, the capture request is approved.
  • the method 200 further comprises generating, by the packet capture service, a filter related to the capture request for capturing packets associated with the connection of the second container prior to approval of the capture request.
  • the packet capture service is configured to setup a filter comprising one or more filter expressions for filtering one or more of packets associated with the first capture session and packets originating from the packet capture service.
  • the packet capture service approves the capture request since the generated filter eliminates self recordal by the packet capture service.
  • the packet capture service prior to generation of the filter, is configured to determine if there is already a filter associated with the overlapping network interfaces, and accordingly, if there is a filter already, the packet capture service does not generate the filter. In an example, the packet capture service does not approve the capture request since it may not be possible to deploy two filters in relation to the same network interface. In another example, the existing filter is amended to eliminate self recordal in case the capture request is approved. The aspect of the filter is explained below using an example.
  • the packet capture service 110 is connected to the packet capture client via a reverse proxy device over a first network interface of the reverse proxy device 150.
  • the packet capture client has the IP address 1.2.3.4 and is connected to the reverse proxy device 150 via the TCP port 55555.
  • the first network interface of the reverse proxy device 150 has the IP address 192.168.1.2 and is connected over TCP port 80 to the packet capture client.
  • the packet capture service has the IP address 1.1.3.4 and is connected to the reverse proxy device 150 via the first network interface at TCP port 49456.
  • the packet capture service 110 receive the capture request for capturing packets between the applications 120 and 130 which are connected via the reverse proxy device 150 via a second network interface of the reverse proxy device 150.
  • the second network interface of the reverse proxy device 150 has the IP address 172.17.2.1 and is connected to the applications 120 and 130 over TCP ports 49987 and TCP port 49123.
  • the capture request specifies that packet capture should take place at down the first and second interfaces of the reverse proxy device 150. Since the first network interface is present in the connection between the packet capture client and the packet capture service, the packet capture service generates and deploys a filter prior to the approval of the capture request.
  • the filter contains an expression with a 'not' operator to exclude packets containing a combination of (IP address and port address) 1.2.3.4:55555 and 192.168.1.2:80 where either of the IP address and port address may be present in packet source or packet destination. Accordingly, the filter excludes recordal of all packets originating at the packet capture client and is sent to the reverse proxy device 150 and all packets transmitted from the reverse proxy device and transmitted to the packet capture client.
  • the packet capture service includes a path finder module which is used in determining the network path as mentioned above.
  • the packet capture client and each reverse proxy device is configured to write the corresponding network information into the capture request. This information along with the network topology is used to determine the network interfaces used between the packet capture service and the packet capture client.
  • the packet capture service includes a filter generator module for generating the filter as mentioned above.
  • the current disclosure describes a method to ensure packet capture is not inflated due to the use of HTTP proxies and servers while being able to utilize packets with standardized headers which only provide path information from the network level (layer 3 of the ISO/OSI layer model) upwards.
  • the network level layer 3 of the ISO/OSI layer model
  • the likelihood of self recordal is eliminated. Accordingly, a new recording is only started if the network interfaces to be recorded are not located on any of the previous paths (or sections) of active capture sessions, or if the network interfaces to be recorded are not on the path of communication with the packet capture client.
  • the method 200 may be realized using one or more devices.
  • the method 200 may be realized via a packet capture device 300 as shown in figure 3 .
  • the packet capture device 300 comprises a network interface 310 for transmitting and receiving packets, and one or more processors 320.
  • the one or more processors 320 is connected to a memory module 330 which includes a plurality of instructions which when executed on the one or more processors, cause the processors to receive a capture request for capturing packets associated with a connection of a second container from the one or more containers, wherein the connection is between the second container and a network destination for transmitting one or more packets; determine a network path associated with the connection of the second container, wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination; determine the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approve the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the
  • the present disclosure can take a form of a computer program product comprising program modules accessible from computer-usable or computer-readable medium storing program code for use by or in connection with one or more computers, processing units, or instruction execution system.
  • a computer-usable or computer-readable non-transitory storage medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation mediums in and of themselves as signal carriers are not included in the definition of physical computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, random access memory (RAM), a read only memory (ROM), a rigid magnetic disk and optical disk such as compact disk read-only memory (CD-ROM), compact disk read/write, and DVD.
  • RAM random access memory
  • ROM read only memory
  • CD-ROM compact disk read-only memory
  • DVD compact disk read/write

Abstract

The current disclosure describes a method of capturing packets from one or more applications hosted on containers connected to one or more network interfaces in a section of the industrial network by a packet capture service. The method comprises receiving a capture request for capturing packets associated with a connection of a second container from the one or more containers, determining a network path associated with the connection of the second container; determining the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approving the capture request based on the between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container.

Description

    Background:
  • The current disclosure relates to containers in industrial automation. More particularly, the current disclosure relates to packet capture and analysis of network traffic in relation to containers. A packet capture tool (also known as a packet sniffer or packet analyzer) is a program or special hardware that is capable of intercepting and logging packets that transmitted in a network. These packets are then used to analyze network behavior to improve network performance.
  • Description:
  • The current disclosure relates to packet capture and analysis in industrial networks. With the advent of container technology, containers have been deployed in a plurality of scenarios including industrial automation. In additional a multitube of physical assets, there are a huge number of virtual assets in automation networks. These virtual assets or industrial applications are deployed and executed in huge numbers, since they are container based and are rather small and nimble. These industrial applications may run in the plant on Industrial Edges or may be executed on industrial OT clusters, where they still have direct network access to the production network. Accordingly, given the huge number of assets (both physical and virtual) in the automation network, it becomes necessary to perform network analysis to ensure network utilization is optimal. In order to perform network analysis, packets in the network are recorded for analysis.
  • This is done by packet capture tools. Using packet capture tools, network traffic can be recorded inside and to/from an Industrial Edge device from a remote computer (also referred to as capture client), observe them live and evaluate them without delay during recording. The packets are recorded in the industrial device, but not stored there, but instead immediately transferred via a so-called web socket connection to the capture client for recording and evaluation.
  • For certain communication problems and paths, however, the communication between an application on the industrial device and the automation devices outside the industrial device must be recorded in particular at the physical interfaces of the industrial device in contrast to a recording purely at the virtual network interface of a container associated with the application. However, there is the problem that feedback may arise in the recording or transmission of the recorded packets: since the packets are recorded at a point in the network of the industrial device, over which these packets are subsequently transmitted as a recording stream, feedback occurs. As a result, the recording is massively inflated and not significantly reliable. Accordingly, there is a need for a capture service capable of automatically prevent self-recording.
  • Accordingly, the current disclosure describes a method according to claim 1 and a device according to claim 11 which address the issues mentioned above.
  • The current disclosure describes a method of capturing packets from one or more applications hosted on one or more containers connected to one or more network interfaces in a section of the industrial network by a packet capture service. The packet capture service is connected to a packet capture client for transmitting the captured packets to the packet capture client and includes a first capture session capturing packets associated with a first container. The method comprises receiving a capture request for capturing packets associated with a connection of a second container from the one or more containers, wherein the connection is between the second container and a network destination for transmitting one or more packets; determining a network path associated with the connection of the second container, wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination; determining the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approving the capture request based on the between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container.
  • Accordingly, the current disclosure describes a method for packet capture where incoming capture requests are checked for potential overlaps in relation to network interfaces with existing capture sessions and the connection between the packet capture service and the packet capture client (s). Accordingly, the current method ensures that the risk of self-recording is eliminated.
  • In an example, the capture request is approved when the one or more network interfaces are not present in the first capture session and the connection between the packet capture service and the packet capture client. Accordingly, the capture requests when there is a possibility of self-recording is determined based on the network interfaces and are not processed further.
  • In an example, the method further comprises generating a filter related to the capture request for capturing packets associated with the connection of the second container, when at least one network interface from the one or more network interfaces is present in the first capture session and the connection between the packet capture service and the packet capture client and wherein the filter comprises one or more filter expressions for filtering one or more of packets associated with the first capture session and packets originating from the packet capture service. Accordingly, in spite of a potential overlap in the network interfaces, the method avoids the possibility of self-recording by dynamically generating a filter in order to filter packets associated with the packet capture service from being recorded by the packet capture service.
  • In an example, approving the capture request comprises detecting a presence of a filter in relation to the one or more network interfaces, wherein the capture request is not approved when the filter is detected. Accordingly, the method allows for determining if there is a filter already associated with the network interfaces and in case such a filter is already present, a new filter may not be compatible.
  • In an example, the capture request is transmitted by the packet capture client and the capture request comprises network information associated with the packet capture client. Accordingly, the determination of the network interfaces associated with the connection between the packet capture client and the packet capture service is determined based on the network information associated with the packet capture client. In an example, the capture request comprises network information associated with the second container. Accordingly, determination of the network path comprising determining one or more intermediate network interfaces based on the network information associated with the second container and a network topology associated the section of industrial network.
  • In an example, the method further determining a first set of network interfaces used in the connection between the packet capture service and the packet capture client based on the network information of the packet capture client and a network topology associated with the section of the industrial network. In an example, the one or more intermediate network interfaces belong to at least one reverse proxy device. In an example, the network topology includes IP/TCP address configuration and IP route information of the one or more containers and the one or more network interfaces.
  • In another aspect, the current disclosure describes a packet capture device for of capturing packets from one or more containers connected to one or more network interfaces in a section of the industrial network. The packet capture device is connected to a packet capture client for transmitting the captured packets to the packet capture client and includes a first capture session capturing packets associated with a first container. The packet capture device comprises one or more processors configured to receive a capture request for capturing packets associated with a connection of a second container from the one or more containers, wherein the connection is between the second container and a network destination for transmitting one or more packets; determine a network path associated with the connection of the second container, wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination; determine the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approve the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container. The advantages of the method are applicable to the device as well. These aspects are further explained in relation to figures 1-3.
    • Figure 1 illustrates a section of an industrial facility including a packet capture service for capturing packets between two or more applications;
    • Figure 2 illustrates a method of capturing packets from one or more containers connected to one or more network interfaces in a section of the industrial network; and
    • Figure 3 illustrates a packet capture device for capturing packets from one or more containers connected to one or more network interfaces in a section of the industrial network.
  • Figure 1 illustrates a section of an industrial facility 100 comprising a plurality of applications (120, 130 and 140). Industrial facility herein refers to any environment where one or more industrial processes such as manufacturing, refining, smelting, or assembly of equipment, generation, transmission or distribution of electricity, transportation, may take place. This includes process plants, oil refineries, automobile factories, power plants, smart grids, electrical substations, storehouses, etc. The plurality of industrial process and operations may be carried out in production cells using a plurality of devices such as control devices, field devices, mobile devices, etc., present with the corresponding production cell. The control devices include process controllers, programmable logic controllers, supervisory controllers, automated guided vehicles, robots, operator devices, etc. One or more control devices are connected to a plurality of field devices (not shown in figure) such as actuators and sensor devices for monitoring and controlling various industrial processes in the industrial facility. These field devices can include flowmeters, value actuators, temperature sensors, pressure sensors, etc. Additionally, the industrial facility includes a plurality of mobile devices (also referred to as mobile network devices) including one or more robots for performing a plurality of operations such as welding, assembly of parts; one or more autonomous guided vehicles for transportation and handling of material; one or more assets with RFID tags on conveyor belts, etc. in the industrial facility. Additionally, the industrial facility may include an operator station for displaying the status of the industrial facility to an operator and for allowing the operator to define KPIs for the control of the industrial processes in the facility. All the industrial devices may be connected to each other via a plant network (realized via wired and wireless technologies).
  • Communication in the above-mentioned plant network happens through wired and wireless means or technologies. Accordingly, the industrial facility utilizes the wireless communication network for enabling communication amongst the various devices of the industrial facility. The wireless network is based on cellular technology and comprises a plurality of gateway devices or network devices. Gateway devices herein refers to one or more devices capable of connecting the user devices to the wireless network. Examples of gateway devices include base stations, routers, switches, relays, access points, etc. The plurality of gateway devices may include stationary gateway devices which may be affixed to a plurality of locations in the industrial facility. A plurality of the industrial devices in the facility are connected to one or more gateway devices to connect to the wireless network and for communicating information with the other devices and systems in the industrial facility. The industrial devices include the industrial applications which are capable of processing data from other industrial devices. The applications (120, 130 and 140) are hosted on one or more containers (not shown in the figure) and accordingly may be hosted in a container cluster. The applications may communicate with each other via one or more network / gateway devices present in the section 100. For example, application 120 is connected to the application 130 via the reverse proxy device 150. Similarly, application 130 is connected to the application 140 via the reverse proxy device 160.
  • Additionally, the section 100 includes a packet capture service 110 for capturing packets associated with the applications (120, 130 and 140). For capturing packets associated with the applications, the packet capture service is configured to listen and capture packets at the external network interfaces associated with the reverse proxy devices. As mentioned previously, this is done since certain communications between an application an industrial device and the automation devices outside the industrial device must be recorded in particular at the physical interfaces instead of the virtual network interface of the container associated with the application. Such recordings at the external or physical interfaces are always necessary in order to detect or exclude disturbances in the communication components responsible in an industrial edge. In addition, some applications must be connected directly at the level of the data link layer to plant networks - and thus to the external interfaces - because they have to speak non-IP-based automation protocols when communicating with automation devices.
  • Additionally, the packet capture service 110 is connected to one or more packet capture clients (shown in the figure as packet capture client 180). The packet capture service 110 is configured to receive capture request from a packet capture client, process the capture request, start a capture session in response to the capture request and transmit the captured packets to the packet capture client. However, in order ensure that the packet capture service 110 does not record the packets transmitted to the packet capture clients or packets already captured by an existing capture session, the packet capture service 110 is configured to process the capture request. Based on the processing, the packet capture service 110 determines if the capture session is to be created or not and if a filter is required in order to filter out certain packets from being captured. This is further explained in relation to figure 2.
  • Figure 2 illustrates a method 200 of capturing packets from one or more applications hosted on one or more containers connected to one or more network interfaces in the section of the industrial network 100. The method 200 is implemented by the packet capture service 110. For the sake of explanation, the packet capture service 110 is capturing packets associated with a communication between application 130 and application 140 at a first network interface of the reverse proxy device 160.
  • At step 210, the packet capture service receives a capture request for capturing packets associated with a connection of a second container from the one or more containers. The connection is between the second container and a network destination for transmitting one or more packets. In an example, the second container is associated with the application 120 and the network destination is the container associated with the application 130. The capture request is transmitted by the packet capture client 180.
  • At step 220, the packet capture service determines a network path associated with the connection of the second container. The network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination. The network path associated with the connection of the second container is determined based on network information associated with the second container. In an example, the network information associated with the second container is determined by the packet capture service 110 using a network discovery and management service. In another example, the network information of the second container is included in the capture request from the packet capture client. Based on the network information, the packet capture service is configured to determine the network path using a network topology associated with the section of the industrial facility 100. Network topology herein refers to topological information of the network devices indicating the corresponding connections amongst the network devices. The network topology indicates the physical and virtual connections between devices along with the data flows possible between the devices. For example, for linux devices, this include VETH network interface connection pair information. Accordingly, the network topology includes routing information, TCP/IP address configuration, and link layer information associated with the device in the network. Network topology additionally includes information on the network interfaces and their assignment to (virtual) IP stacks, assignment of the network interfaces to containers and their services, in particular the proxies and the capture service, the direct data link layer connections between network interfaces (in particular of type VETH and MACVLAN), the IP addresses assigned to the network interfaces, and the route information of the (virtual) IP stacks.
  • Network path herein refers to the various network interfaces and network devices over which the connection between the second container and the network destination is established. Network interfaces includes both virtual and physical interfaces. For example, the network path between the second application associated with the application 120 and the network destination i.e. the container associated with the application 130 includes the network interfaces (virtual and real) of the second container on which the packets associated with the application 120 are transmitted/received, the network interfaces of the reverse proxy device 150 (which acts as an intermediate network device between the second container and the network destination), and the network interfaces (virtual and real) of the network destination on which the packets associated with the application 120 are transmitted/received.
  • For calculating the network path, the packet capture service determines the starting point of the path (212), that is: the (external) network interface, using the packet capture client's IP address and IP route tables to determine the incoming external network interface. Then, the packet capture service determines the end of the first path segment at the reverse proxy device RPR using the route table and IP addresses of the reverse proxy device. In additional reverse proxy devices are used, the packet capture service iteratively performs the above step to determine the network interfaces till the path terminates at the packet capture service. Accordingly, the packet capture service determines path segments based on the IP addresses recorded in web socket/HTTP headers mentioned in the capture request. Additionally, the packet capture service also records the TCP ports used along the path, as the individual segments are determined. An example network path is shown below: segment #1: from external ETH "ens33" with IP: port 1.2.3.4:443 to RPR's ETH "eth0" with 172.17.1.1:443, includes layer 2 interfaces "ens33", "docker0", "veth1234", "ethO"; and segment #2: from RPR's "eth1" with 172.17.6.66:12345 to CS' "eth0" with 172.17.6.99:5001, includes layer 2 interfaces "eth1", "vethabcd", "br-6667", "vethxyzz", "eth0".
  • Then, at step 230, the packet capture service determines the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client. Based on the network path associated with the second container, the packet capture service determines if there is any overlap in the determined network path and the first capture session or the connection with the packet capture client. The packet capture service is configured to determine the network interfaces associated with the packet capture client and the packet capture service. Similar to determination of the network path mentioned above, the packet capture service is configured to obtain network information associated with the packet capture client (from either a network discovery service or from the packet capture client itself) and based on the network information and the network topology, the packet capture service determines the network interfaces used in the connection between the packet capture client and the packet capture service. Then, the packet capture service determines if there is one or more network interfaces which is present in both the network path between the second container and the network destination, and the connection between the packet capture client and the packet capture service. Similarly, the packet capture service includes a network path for the first capture session which includes the network interfaces associated with the communication between application 130 and application 140, i.e., the network interfaces of the containers of the application 130 and 140, and the first network interface of the reverse proxy device 160. Then, the packet capture service determines if there is one or more network interfaces which is present in both the network path between the second container and the network destination, and the network path of the first capture session.
  • Then, at step 240, the packet capture service approves the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container. In a first example, the capture request is approved when the one or more network interfaces in the network path of the second connection are not present in the first capture session and the connection between the packet capture service and the packet capture client. Accordingly, when there is not overlap of network interfaces, the packet capture service determines that there is no likelihood of self-recording and accordingly, the capture request is approved.
  • In second example, the method 200 further comprises generating, by the packet capture service, a filter related to the capture request for capturing packets associated with the connection of the second container prior to approval of the capture request. When at least one network interface from the one or more network interfaces is present in the first capture session or the connection between the packet capture service and the packet capture client, the packet capture service is configured to setup a filter comprising one or more filter expressions for filtering one or more of packets associated with the first capture session and packets originating from the packet capture service. Subsequent to the successful deployment of the generated filter, the packet capture service approves the capture request since the generated filter eliminates self recordal by the packet capture service. However, prior to generation of the filter, the packet capture service is configured to determine if there is already a filter associated with the overlapping network interfaces, and accordingly, if there is a filter already, the packet capture service does not generate the filter. In an example, the packet capture service does not approve the capture request since it may not be possible to deploy two filters in relation to the same network interface. In another example, the existing filter is amended to eliminate self recordal in case the capture request is approved. The aspect of the filter is explained below using an example.
  • In an example, as mentioned above, the packet capture service 110 is connected to the packet capture client via a reverse proxy device over a first network interface of the reverse proxy device 150. The packet capture client has the IP address 1.2.3.4 and is connected to the reverse proxy device 150 via the TCP port 55555. The first network interface of the reverse proxy device 150 has the IP address 192.168.1.2 and is connected over TCP port 80 to the packet capture client. Similarly, the packet capture service has the IP address 1.1.3.4 and is connected to the reverse proxy device 150 via the first network interface at TCP port 49456.
  • The packet capture service 110 receive the capture request for capturing packets between the applications 120 and 130 which are connected via the reverse proxy device 150 via a second network interface of the reverse proxy device 150. The second network interface of the reverse proxy device 150 has the IP address 172.17.2.1 and is connected to the applications 120 and 130 over TCP ports 49987 and TCP port 49123. The capture request specifies that packet capture should take place at down the first and second interfaces of the reverse proxy device 150. Since the first network interface is present in the connection between the packet capture client and the packet capture service, the packet capture service generates and deploys a filter prior to the approval of the capture request. The filter contains an expression with a 'not' operator to exclude packets containing a combination of (IP address and port address) 1.2.3.4:55555 and 192.168.1.2:80 where either of the IP address and port address may be present in packet source or packet destination. Accordingly, the filter excludes recordal of all packets originating at the packet capture client and is sent to the reverse proxy device 150 and all packets transmitted from the reverse proxy device and transmitted to the packet capture client.
  • In an example, the packet capture service includes a path finder module which is used in determining the network path as mentioned above. In an example, for determining the network interfaces used in the connection between the packet capture client and the packet capture service, the packet capture client and each reverse proxy device is configured to write the corresponding network information into the capture request. This information along with the network topology is used to determine the network interfaces used between the packet capture service and the packet capture client. In an example, the packet capture service includes a filter generator module for generating the filter as mentioned above.
  • Accordingly, the current disclosure describes a method to ensure packet capture is not inflated due to the use of HTTP proxies and servers while being able to utilize packets with standardized headers which only provide path information from the network level (layer 3 of the ISO/OSI layer model) upwards. By combining the standardized available path information with topology information of the various layers of the network, the likelihood of self recordal is eliminated. Accordingly, a new recording is only started if the network interfaces to be recorded are not located on any of the previous paths (or sections) of active capture sessions, or if the network interfaces to be recorded are not on the path of communication with the packet capture client.
  • Additionally, while the above method 200 has been explained in relation to packet capture service, the method 200 may be realized using one or more devices. For example, the method 200 may be realized via a packet capture device 300 as shown in figure 3.
  • The packet capture device 300 comprises a network interface 310 for transmitting and receiving packets, and one or more processors 320. The one or more processors 320 is connected to a memory module 330 which includes a plurality of instructions which when executed on the one or more processors, cause the processors to receive a capture request for capturing packets associated with a connection of a second container from the one or more containers, wherein the connection is between the second container and a network destination for transmitting one or more packets; determine a network path associated with the connection of the second container, wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container to the network destination; determine the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service and a packet capture client; and approve the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service and a packet capture client for creating a second capture session for capturing packets associated with the connection of the second container.
  • It is to be noted that while the above disclosure has explained in relation to the packet capture device, the above method may be realized in another device or a plurality of devices. For example, the method 200 may be implemented in an edge server. Accordingly, the present disclosure can take a form of a computer program product comprising program modules accessible from computer-usable or computer-readable medium storing program code for use by or in connection with one or more computers, processing units, or instruction execution system. For the purpose of this description, a computer-usable or computer-readable non-transitory storage medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation mediums in and of themselves as signal carriers are not included in the definition of physical computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, random access memory (RAM), a read only memory (ROM), a rigid magnetic disk and optical disk such as compact disk read-only memory (CD-ROM), compact disk read/write, and DVD. Both processing units and program code for implementing each aspect of the technology can be centralized or distributed (or a combination thereof) as known to those skilled in the art.
  • In view of the present disclosure, many modifications and variations would be present themselves, to those skilled in the art without departing from the scope of the various embodiments of the present disclosure, as described herein. The scope of the present disclosure is, therefore, indicated by the following claims rather than by the foregoing description. All changes, modifications, and variations coming within the meaning and range of equivalency of the claims are to be considered within their scope. All advantageous embodiments claimed in method claims may also be applied to device/non transitory storage medium claims.

Claims (11)

  1. A method (200) of capturing packets from one or more applications (120, 130, 140) hosted on one or more containers connected to one or more network interfaces in a section of the industrial network (100), by a packet capture service (110) wherein the packet capture service (110) is connected to a packet capture client (180) for transmitting the captured packets to the packet capture client (180), the method (200) comprising:
    a. receiving (210) a capture request for capturing packets associated with a connection of a second container (120) from the one or more containers (120, 130, 140), wherein the connection is between the second container (120) and a network destination for transmitting one or more packets;
    b. determining (220) a network path associated with the connection of the second container (120), wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container (120) to the network destination;
    c. determining (230) the presence of the one or more network interfaces in one of a first capture session and the connection between the packet capture service (110) and a packet capture client (180); and
    d. approving (240) the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service (110) and a packet capture client (180) for creating a second capture session for capturing packets associated with the connection of the second container (120).
  2. The method (200) as claimed in claim 1, wherein the first capture session is for capturing packets associated with a first container (130).
  3. The method (200) as claimed in claim 1, wherein the capture request is approved when the one or more network interfaces are not present in the first capture session and the connection between the packet capture service (110) and the packet capture client (180).
  4. The method (200) as claimed in claim 1, wherein the method (200) further comprises generating a filter related to the capture request for capturing packets associated with the connection of the second container (120), when at least one network interface from the one or more network interfaces is present in the first capture session and the connection between the packet capture service (110) and the packet capture client (180) and wherein the filter comprises one or more filter expressions for filtering one or more of packets associated with the first capture session and packets originating from or transmitted to the packet capture service (110).
  5. The method (200) as claimed in claim 1, wherein approving the capture request comprises detecting a presence of a filter in relation to the one or more network interfaces, wherein the capture request is not approved when the filter is detected.
  6. The method (200) as claimed in claim 1, wherein the capture request is transmitted by the packet capture client (180) and the capture request comprises network information associated with the packet capture client (180) .
  7. The method (200) as claimed in claim 1, wherein the capture request comprises network information associated with the second container (120) and wherein determining the network path comprising determining one or more intermediate network interfaces based on the network information associated with the second container (120) and a network topology associated the section of industrial network (110).
  8. The method (200) as claimed in claim 6, wherein the method (200) further determining a first set of network interfaces used in the connection between the packet capture service (110) and the packet capture client (180) based on the network information of the packet capture client (180) and a network topology associated with the section of the industrial network (100).
  9. The method (200) as claimed in claim 7, wherein the one or more intermediate network interfaces belong to at least one reverse proxy device (150).
  10. The method (200) as claimed in claim 7, wherein the network topology includes IP/TCP address configuration and IP route information of the one or more containers (120, 130, 140) and the one or more network interfaces.
  11. A packet capture device (300) for of capturing packets from one or more applications hosted on one containers (120, 130, 140) connected to one or more network interfaces in a section of the industrial network (100) wherein the packet capture device (300) is connected to a packet capture client (180) for transmitting the captured packets to the packet capture client (180) and includes a first capture session capturing packets associated with a first container (130), the packet capture device (300) comprising: a. one or more processors (320) configured to:
    i. receive a capture request for capturing packets associated with a connection of a second container (120) from the one or more containers (120, 130, 140), wherein the connection is between the second container (120) and a network destination for transmitting one or more packets;
    ii. determine a network path associated with the connection of the second container (120), wherein the network path is indicative of the one or more network interfaces used by the packets of the connection from the second container (120) to the network destination;
    iii. determine the presence of the one or more network interfaces in one of first capture session and the connection between the packet capture service (110) and a packet capture client (180); and
    iv. approve the capture request based on the presence of the one or more network interfaces in one of first capture session and a connection between the packet capture service (110) and a packet capture client (180) for creating a second capture session for capturing packets associated with the connection of the second container (120).
EP21199113.8A 2021-09-27 2021-09-27 Method of capturing packets from applications hosted containers Withdrawn EP4156634A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21199113.8A EP4156634A1 (en) 2021-09-27 2021-09-27 Method of capturing packets from applications hosted containers
PCT/EP2022/071313 WO2023046340A1 (en) 2021-09-27 2022-07-29 Method of capturing packets from applications hosted on containers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP21199113.8A EP4156634A1 (en) 2021-09-27 2021-09-27 Method of capturing packets from applications hosted containers

Publications (1)

Publication Number Publication Date
EP4156634A1 true EP4156634A1 (en) 2023-03-29

Family

ID=78134741

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21199113.8A Withdrawn EP4156634A1 (en) 2021-09-27 2021-09-27 Method of capturing packets from applications hosted containers

Country Status (2)

Country Link
EP (1) EP4156634A1 (en)
WO (1) WO2023046340A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200019485A1 (en) * 2016-12-28 2020-01-16 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic management of monitoring tasks in a cloud environment
US20200236037A1 (en) * 2019-01-21 2020-07-23 Vmware, Inc. Adaptive packet flow monitoring in software-defined networking environments
US20200293418A1 (en) * 2017-10-30 2020-09-17 Telefonaktiebolaget Lm Ericsson (Publ) Network node, monitoring node and methods performed therein

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200019485A1 (en) * 2016-12-28 2020-01-16 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic management of monitoring tasks in a cloud environment
US20200293418A1 (en) * 2017-10-30 2020-09-17 Telefonaktiebolaget Lm Ericsson (Publ) Network node, monitoring node and methods performed therein
US20200236037A1 (en) * 2019-01-21 2020-07-23 Vmware, Inc. Adaptive packet flow monitoring in software-defined networking environments

Also Published As

Publication number Publication date
WO2023046340A1 (en) 2023-03-30

Similar Documents

Publication Publication Date Title
CN110752952B (en) Network fault positioning method and device, network equipment and computer storage medium
CN113726843B (en) Edge cloud system, data transmission method, device and storage medium
CN112751733B (en) Link detection method, device, equipment, system and switch
CN103139075B (en) A kind of message transmitting method and equipment
Strinati et al. Beyond 5G private networks: the 5g CONNI perspective
CN103262046A (en) Server management apparatus, server management method, and program
CN109495320A (en) A kind of transmission method and device of data message
CN108173695B (en) Flow monitoring system and method in cloud environment
US11418521B2 (en) Industrial control system monitoring method, device and system, and computer-readable medium
EP4156634A1 (en) Method of capturing packets from applications hosted containers
CN106597873A (en) Method, device and system for carrying out remote maintenance of automation equipment
CN116915827A (en) Data transmission method and device of internet of things edge gateway, electronic equipment and medium
CN102204169A (en) Fault detection method, route node and system
US20220294878A1 (en) Method and Gateway Device for Transmitting Datagrams via a Plurality of Networks
CN115150207A (en) Industrial network equipment identification method and device, terminal equipment and storage medium
US10397254B2 (en) Method and system of monitoring network
CN111464666B (en) Communication method, communication device, storage medium and processor
EP4061039A1 (en) A method for configuring a profile associated with a user device in an industrial facility
EP4152731A1 (en) A network device for connecting a plurality of industrial devices
CN115442284B (en) System and method for testing equipment
US11743111B2 (en) Network device and a method of configuring the network device therefor
CN115065637B (en) Method and device for transmitting computing power resource information and electronic equipment
EP4124169A1 (en) A method of communicating between a first radio unit and a first distributed unit
Shih et al. Proposal of ES/CPS Architecture for Automotive Automatic Manufacturing Systems
CN114679379A (en) Routing equipment opening method, network element, communication system and medium for networking

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20230930